Spryker Commerce OS 1.4.2 allows Remote Command Execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html | |
http://seclists.org/fulldisclosure/2022/Jul/4 | Third Party Advisory |
http://seclists.org/fulldisclosure/2023/May/2 | |
https://schutzwerk.com | Exploit Not Applicable |
https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html | |
http://seclists.org/fulldisclosure/2022/Jul/4 | Third Party Advisory |
http://seclists.org/fulldisclosure/2023/May/2 | |
https://schutzwerk.com | Exploit Not Applicable |
https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html - Exploit, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html - | |
References | () http://seclists.org/fulldisclosure/2022/Jul/4 - Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2023/May/2 - | |
References | () https://schutzwerk.com - Exploit, Not Applicable | |
References | () https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ - Exploit, Third Party Advisory |
09 May 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 May 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Jul 2022, 11:20
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://schutzwerk.com - Exploit, Not Applicable | |
References | (MISC) https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ - Exploit, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html - Exploit, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/4 - Third Party Advisory | |
CWE | CWE-78 | |
CPE | cpe:2.3:o:spryker:cloud_commerce:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
19 Jul 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jul 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Jul 2022, 19:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-07-13 18:15
Updated : 2024-11-21 06:58
NVD link : CVE-2022-28888
Mitre link : CVE-2022-28888
CVE.ORG link : CVE-2022-28888
JSON object : View
Products Affected
spryker
- cloud_commerce
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')